US11496901B2 - Radio communication apparatus, wireless LAN router, unauthorized access prevention method, and radio communication system - Google Patents
Radio communication apparatus, wireless LAN router, unauthorized access prevention method, and radio communication system Download PDFInfo
- Publication number
- US11496901B2 US11496901B2 US16/971,428 US201816971428A US11496901B2 US 11496901 B2 US11496901 B2 US 11496901B2 US 201816971428 A US201816971428 A US 201816971428A US 11496901 B2 US11496901 B2 US 11496901B2
- Authority
- US
- United States
- Prior art keywords
- radio communication
- radio
- external terminal
- communicator
- communication apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Definitions
- the present invention relates to a radio communication apparatus, a wireless LAN router, an unauthorized access prevention method, and a radio communication system.
- Patent Literature 1 discloses a configuration in which a firewall device transfers a packet to a decoy device based on a distribution condition.
- Patent Literature 2 discloses a configuration in which communication information of an authorized access point is concealed by providing a plurality of access points each of which repeatedly transmits false communication information destined for itself in addition to the authorized access point.
- Patent Literature 1 Japanese Patent No. 3794491
- Patent Literature 2 Japanese Patent No. 5708183
- the present disclosure has been made in view of the aforementioned problem and an example object thereof is to provide a radio communication apparatus, a wireless LAN router, an unauthorized access prevention method, and a radio communication system that have security for protection against unauthorized access.
- a radio communication apparatus includes: first radio communication means for functioning as an access point for radio communication; second radio communication means for functioning as an access point for radio communication; and storage means for storing dummy information, in which the first radio communication means has a security level higher than that of the second radio communication means, and the second radio communication means is capable of transmitting the dummy information stored in the storage means.
- a wireless LAN router includes: first radio communication means for functioning as an access point for radio communication; second radio communication means for functioning as an access point for radio communication; and storage means for storing dummy information, in which the first radio communication means has a security level higher than that of the second radio communication means, and the second radio communication means includes a radio communication apparatus capable of transmitting the dummy information stored in the storage means.
- An unauthorized access prevention method is an unauthorized access prevention method for executing control for preventing unauthorized access to a first radio access point, the unauthorized access prevention method including: detecting a connection from an external terminal to a second radio access point that is set to a security level lower than that of the first radio access point; and transmitting dummy information to the external terminal when the connection from the external terminal to the second radio access point is detected.
- a radio communication system includes a first radio communication apparatus, and a second radio communication apparatus configured to prevent unauthorized access to the first radio communication apparatus, in which each of the first and the second radio communication apparatuses has a function as an access point for radio communication, the first radio communication apparatus has a higher security level than that of the second radio communication apparatus, and the second radio communication apparatus is capable of transmitting dummy information.
- a radio communication apparatus a wireless LAN router, a radio communication method, and a radio communication system that have security for protection against unauthorized access.
- FIG. 1 is a block diagram showing a radio communication apparatus according to a first example embodiment
- FIG. 2 is a block diagram showing a radio communication apparatus according to a second example embodiment
- FIG. 3 is a sequence diagram showing an operation flow of the radio communication apparatus according to the second example embodiment
- FIG. 4 is a sequence diagram showing an operation flow of a radio communication apparatus according to a third example embodiment.
- FIG. 5 is a block diagram showing a radio communication apparatus according to a fourth example embodiment.
- each of the example embodiments described below can be used individually, or two or more of the example embodiments may be appropriately combined with one another. These example embodiments include novel features different from one another. Accordingly, these example embodiments contribute to attaining objects or solving problems different from one another, and thus contribute to providing advantages different from one another.
- FIG. 1 is a block diagram showing a radio communication apparatus 1 according to the first example embodiment.
- the radio communication apparatus 1 includes a first radio communication unit 10 , a second radio communication unit 20 , and a storage unit 21 .
- the first radio communication unit 10 is first radio communication means for functioning as an access point for radio communication.
- the second radio communication unit 20 is second radio communication means for functioning as an access point for radio communication.
- the first radio communication unit 10 has a higher security level than that of the second radio communication unit 20 .
- the storage unit 21 is storage means for storing dummy information.
- the second radio communication unit 20 is connected to the storage unit 21 and can transmit the dummy information stored in the storage unit 21 .
- the dummy information is data that is not confidential or informative and that may be acquired by a third party through unauthorized access.
- the external terminal attempting unauthorized access attempts to connect to either of the first and the second radio communication units 10 and 20 .
- the external terminal attempting unauthorized access cannot easily connect to the first radio communication unit 10 .
- the external terminal attempting unauthorized access can relatively easily connect to the second radio communication unit 20 of which the security level is relatively lower than that of the first radio communication unit 10 . Accordingly, in the above-described configuration, it is possible to guide the external terminal attempting unauthorized access to connect to the second radio communication unit 20 . That is, it is possible to prevent unauthorized access to the first radio communication unit 10 .
- the second radio communication unit 20 can transmit dummy information stored in the storage unit 21 , the external terminal connected to the second radio communication unit 20 can acquire the dummy information.
- the dummy information is data which may be acquired by a third party, so that the unauthorized access causes no damage.
- the radio communication apparatus 1 has security for protecting communication information from unauthorized access.
- FIG. 2 is a block diagram showing a radio communication apparatus 2 according to this example embodiment.
- the radio communication apparatus 2 includes the first radio communication unit 10 , the second radio communication unit 20 , a dummy server 25 , a router 30 , and a warning unit 40 .
- the dummy server 25 includes the storage unit 21 and a detection unit 22 .
- the radio communication apparatus 2 is, for example, a wireless LAN router.
- a first external terminal 100 shown in FIG. 2 is an external terminal that is allowed to access the radio communication apparatus 2 .
- a second external terminal 200 is an external terminal that is not allowed to access the radio communication apparatus 2 .
- a third external terminal 300 is an external terminal used by an administrator of the radio communication apparatus 2 .
- the third external terminal 300 is connected by a wire to the radio communication apparatus 2 .
- the third external terminal 300 has authority to instruct the radio communication apparatus 2 to perform operations such as a shutdown.
- first, the second, the third external terminals 100 , 200 , and 300 are communication terminals such as computers and smartphones. Further, the third external terminal 300 may be wirelessly connected to the radio communication apparatus 2 .
- a server 400 stores information to be protected from unauthorized access.
- the server 400 is a storage device including, for example, a nonvolatile memory.
- the server 400 is connected by a wire to the radio communication apparatus 2 .
- the first external terminal 100 can acquire information stored in the server 400 via the first radio communication unit 10 .
- server 400 may be wirelessly connected to the radio communication apparatus 2 .
- Each of the first and the second radio communication units 10 and 20 can be used as, for example, an access point of a wireless LAN conforming to the IEEE 802.11 standard.
- the first and the second radio communication units 10 and 20 include Service Set IDentifiers (SSIDs) different from each other.
- SSIDs Service Set IDentifiers
- the second radio communication unit 20 may include a plurality of SSIDs.
- the first radio communication unit 10 has a higher security level than that of the second radio communication unit 20 .
- the first radio communication unit 10 can be configured to have the security standard of Wi-Fi Protected Access 2 (WPA2), and the second radio communication unit 20 can be configured to have the security standard of WPA or Wired Equivalent Privacy (WEP).
- WPA2 Wi-Fi Protected Access 2
- WEP Wired Equivalent Privacy
- the first radio communication unit 10 performs authentication using an SSID and a password and is connected to the first external terminal 100 .
- the dummy server 25 is a server including the storage unit 21 and the detection unit 22 .
- the dummy server 25 is connected to the second radio communication unit 20 , the router 30 , and the warning unit 40 . That is, the storage unit 21 and the detection unit 22 housed in the dummy server 25 are configured so that they can connect to the second radio communication unit 20 , the router 30 , and the warning unit 40 .
- the storage unit 21 is storage means for storing dummy information.
- the dummy information refers to data that is not confidential or informative and that may be acquired by a third party through an unauthorized access attack.
- the dummy information can be false information having a format similar to that of information to be protected in the server 400 , such as random personal information or fictitious experimental data.
- the dummy information may be data stored in the storage unit 21 in advance or data acquired from the third external terminal 300 or other networks.
- the detection unit 22 is detection means for detecting a connection from an external terminal to the second radio communication unit 20 .
- the detection unit 22 outputs a detection signal when it detects the connection from the external terminal to the second radio communication unit 20 .
- the router 30 is a router that performs relaying among the first radio communication unit 10 , the dummy server 25 , the third external terminal 300 , and the server 400 .
- the router 30 may be further connected to an external communication apparatus or a network other than the third external terminal 300 and the server 400 .
- the warning unit 40 is warning means for outputting a warning signal when a detection signal is acquired.
- the warning signal is output to warning output means (not shown) included in the radio communication apparatus 2 or an external device (not shown) outside the radio communication apparatus 2 .
- the above warning output means and external device output warnings in the form of, for example, light and sound.
- the second external terminal 200 tries to connect to either of the first and the second radio communication units 10 and 20 in order to obtain information stored in the server 400 .
- the second external terminal 200 acquires the SSID of each of the first and the second radio communication units 10 and 20 , selects one of the SSIDs, and attempts to perform the connection.
- the first radio communication unit 10 has a higher security level than that of the second radio communication unit 20
- the second external terminal 200 cannot easily connect to the first radio communication unit 10 .
- the second external terminal 200 can relatively easily connect to the second radio communication unit 20 of which the security level is relatively lower than that of the first radio communication unit 10 . Accordingly, in above-described configuration, it is possible to guide the second external terminal 200 to connect to the second radio communication unit 20 . That is, it is possible to prevent unauthorized access to information stored in the server 400 .
- the second external terminal 200 can acquire the plurality of SSIDs possessed by the second radio communication unit 20 . That is, a plurality of connection destinations other than the first radio communication unit 10 can be presented to the second external terminal 200 . Accordingly, it is possible to lower the probability that the second external terminal 200 selects the first radio communication unit 10 as a connection destination.
- FIG. 3 is a sequence diagram showing an operation flow of the radio communication apparatus 2 .
- Step S 101 the detection unit 22 monitors an access log of the second radio communication unit 20 and determines whether an external terminal is connected to the second radio communication unit 20 .
- Step S 102 it is assumed that the second external terminal 200 is connected to the second radio communication unit 20 .
- the detection unit 22 detects that the second external terminal 200 is connected to the second radio communication unit 20 .
- Step S 104 the detection unit 22 outputs detection signals to the first and the second radio communication units 10 and 20 , the warning unit 40 , and the third external terminal 300 .
- Step S 105 when the second radio communication unit 20 acquires the detection signal, it transmits dummy information to the second external terminal 200 .
- the second external terminal 200 acquires the dummy information from the second radio communication unit 20 .
- it is difficult for the second external terminal 200 to instantaneously determine whether the dummy information is false information it is possible to let the second external terminal 200 continue to connect to the second radio communication unit 20 . That is, it is possible to prevent the second external terminal 200 from switching the connection destination to the first radio communication unit 10 . Accordingly, an administrator of the radio communication apparatus 2 can take security measures against the unauthorized access from the second external terminal 200 by using the period until the second external terminal 200 notices that the dummy information is false information.
- Step S 106 the first radio communication unit 10 restricts a connection from the second external terminal 200 , which is connected to the second radio communication unit 20 , to the first radio communication unit 10 .
- the first radio communication unit 10 prohibits connections from all the external terminals other than the first external terminal 100 and the third external terminal 300 . By doing so, it is possible to prevent unauthorized access from the second external terminal 200 to the information stored in the server 400 .
- Step S 107 the warning unit 40 outputs a warning signal when it acquires the detection signal.
- the radio communication apparatus 2 or an external device (not shown) outputs a warning in such a manner that it can be recognized by a user.
- Step S 104 an administrator of the radio communication apparatus 2 can recognize that there has been a connection from the external terminal to the second radio communication unit 20 by the detection signal acquired by the third external terminal 300 . Accordingly, in Step S 108 , an administrator of the radio communication apparatus 2 can take security measures such as a shutdown of the radio communication apparatus 2 .
- Steps S 105 to S 108 may be performed in any order or may be performed simultaneously.
- the first radio communication unit 10 may prohibit connections from all the external terminals other than the third external terminal 300 . That is, the first radio communication unit 10 may prohibit the connection from the first external terminal 100 . By doing so, it is possible to prevent an unauthorized user from making unauthorized access by using the first external terminal 100 for an evil purpose.
- the configuration of the radio communication apparatus in this example embodiment is the same as that in the second example embodiment (see FIG. 2 ). However, this example embodiment differs from the second embodiment in that the detection unit 22 according to this example embodiment has a function of detecting identification information of an external terminal connected to the second radio communication unit 20 .
- the identification information is information such as a Media Access Control (MAC) address and an Internet Protocol (IP) address by which communication terminals can be identified.
- MAC Media Access Control
- IP Internet Protocol
- FIG. 4 is a sequence diagram showing an operation flow of the radio communication apparatus according to this example embodiment.
- the operation flow of the radio communication apparatus includes Steps S 203 to S 208 after Step S 104 . Note that in FIG. 4 , Steps S 101 to S 103 are omitted.
- Step S 203 after Step S 104 the detection unit 22 according to this example embodiment analyzes the access log of the second radio communication unit 20 and detects identification information of the second external terminal 200 connected to the second radio communication unit 20 .
- Step S 204 the detection unit 22 outputs a detection signal including the identification information of the second external terminal 200 to the first and the second radio communication units 10 and 20 and the third external terminal 300 .
- Step S 205 the second radio communication unit 20 restricts a connection from the external terminal having the identification information included in the acquired detection signal to the second radio communication unit 20 .
- the second radio communication unit 20 prohibits a connection from the external terminal corresponding to the acquired identification information. By doing so, it is possible to prevent damage from an unauthorized access attack to the second radio communication unit 20 .
- the first radio communication unit 10 restricts a connection from the external terminal having the identification information included in the acquired detection signal to the first radio communication unit 10 .
- the first radio communication unit 10 prohibits a connection from the external terminal corresponding to the acquired identification information. By doing so, it is possible to prevent unauthorized access from the second external terminal 200 to the first radio communication unit 10 .
- Step S 206 when the first radio communication unit 10 determines that the identification information included in the acquired detection signal is identification information of the terminal of an authorized user, the first radio communication unit 10 may allow the terminal of the authorized user to connect to the first radio communication unit 10 .
- the first radio communication unit 10 may determine whether the acquired identification information is identification information of the terminal of an authorized user by checking it against a predetermined authorization list. In this case, it is possible to prevent a connection from an authorized user to the first radio communication unit 10 from being wrongly restricted.
- Step S 204 an administrator of the radio communication apparatus 2 can recognize the identification information of the terminal connected to the second radio communication unit 20 by the detection signal acquired by the third external terminal 300 . Accordingly, in Step S 208 , the administrator of the radio communication apparatus 2 can take measures such as reporting of the second external terminal 200 based on the identification information.
- Steps S 106 and S 108 may be omitted.
- Steps S 205 to S 208 may be performed in any order or may be performed simultaneously.
- FIG. 5 is a block diagram showing a radio communication apparatus 3 according to the fourth example embodiment.
- the radio communication apparatus 3 includes the first radio communication unit 10 , the second radio communication unit 20 , and the storage unit 21 .
- another radio communication apparatus 500 shown in FIG. 5 is a radio communication apparatus different from the radio communication apparatus 3 .
- the other radio communication apparatus 500 may be, for example, an access point of a wireless LAN or a communication terminal such as a computer or a smartphone. Further, the other radio communication apparatus 500 may be connected to an external terminal (not shown) used by an administrator of the radio communication apparatus 3 .
- the second radio communication unit 20 is connected to the other predetermined radio communication apparatus 500 . Further, the second radio communication unit 20 repeatedly performs radio communication with the other predetermined radio communication apparatus 500 .
- the second radio communication unit 20 actively performs radio communication, it is possible to give the impression that the second radio communication unit 20 is an important access point to an unauthorized user who tries to obtain unauthorized access. Accordingly, it is possible to facilitate guiding an unauthorized user to make unauthorized access to the second radio communication unit 20 .
- the first and the second radio communication units 10 and 20 may be stored in housings different from each other. In such a configuration, it is possible to separately manage the housing including the first radio communication unit 10 and the housing including the second radio communication unit 20 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- 1-3 RADIO COMMUNICATION APPARATUS
- 10 FIRST RADIO COMMUNICATION UNIT
- 20 SECOND RADIO COMMUNICATION UNIT
- 21 STORAGE UNIT
- 22 DETECTION UNIT
- 25 DUMMY SERVER
- 30 ROUTER
- 40 WARNING UNIT
- 100 FIRST EXTERNAL TERMINAL
- 200 SECOND EXTERNAL TERMINAL
- 300 THIRD EXTERNAL TERMINAL
- 400 SERVER
- 500 ANOTHER RADIO COMMUNICATION APPARATUS
Claims (9)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2018/007302 WO2019167132A1 (en) | 2018-02-27 | 2018-02-27 | Wireless communication device, wireless lan router, unauthorized access prevention method and wireless communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20200389794A1 US20200389794A1 (en) | 2020-12-10 |
US11496901B2 true US11496901B2 (en) | 2022-11-08 |
Family
ID=67806160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/971,428 Active US11496901B2 (en) | 2018-02-27 | 2018-02-27 | Radio communication apparatus, wireless LAN router, unauthorized access prevention method, and radio communication system |
Country Status (3)
Country | Link |
---|---|
US (1) | US11496901B2 (en) |
JP (1) | JP7127885B2 (en) |
WO (1) | WO2019167132A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7307648B2 (en) * | 2019-09-30 | 2023-07-12 | 株式会社日本総合研究所 | System, decoy PC, control device, method and program for reverse phishing against phishing mail |
JP7473972B2 (en) | 2021-07-19 | 2024-04-24 | サイレックス・テクノロジー株式会社 | Access point, communication system, and communication method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040172557A1 (en) | 2002-08-20 | 2004-09-02 | Masayuki Nakae | Attack defending system and attack defending method |
JP2007174287A (en) | 2005-12-22 | 2007-07-05 | Nec Corp | Radio packet communication system, radio packet base station, radio packet terminal and illegal communication canceling method |
JP2009065538A (en) | 2007-09-07 | 2009-03-26 | Optim Corp | Network connecting method, and network device |
WO2010038726A1 (en) | 2008-09-30 | 2010-04-08 | 日本電気株式会社 | Information report system, information report method, communication terminal, and program |
JP2012222761A (en) | 2011-04-14 | 2012-11-12 | Fujitsu Semiconductor Ltd | Radio communication equipment and radio communication method |
US20140031078A1 (en) | 2012-07-27 | 2014-01-30 | Brother Kogyo Kabushiki Kaisha | Communication Device |
WO2016136648A1 (en) | 2015-02-25 | 2016-09-01 | 京セラ株式会社 | Network device |
US20180249517A1 (en) * | 2017-02-27 | 2018-08-30 | Samsung Electronics Co., Ltd | Method and apparatus for managing wireless router and device connected thereto |
US20180332471A1 (en) * | 2016-05-05 | 2018-11-15 | Tencent Technology (Shenzhen) Company Limited | Wireless network connection method, wireless access point, server, and system |
-
2018
- 2018-02-27 JP JP2020503133A patent/JP7127885B2/en active Active
- 2018-02-27 WO PCT/JP2018/007302 patent/WO2019167132A1/en active Application Filing
- 2018-02-27 US US16/971,428 patent/US11496901B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3794491B2 (en) | 2002-08-20 | 2006-07-05 | 日本電気株式会社 | Attack defense system and attack defense method |
US20040172557A1 (en) | 2002-08-20 | 2004-09-02 | Masayuki Nakae | Attack defending system and attack defending method |
JP2007174287A (en) | 2005-12-22 | 2007-07-05 | Nec Corp | Radio packet communication system, radio packet base station, radio packet terminal and illegal communication canceling method |
JP2009065538A (en) | 2007-09-07 | 2009-03-26 | Optim Corp | Network connecting method, and network device |
WO2010038726A1 (en) | 2008-09-30 | 2010-04-08 | 日本電気株式会社 | Information report system, information report method, communication terminal, and program |
JP5708183B2 (en) | 2011-04-14 | 2015-04-30 | 富士通セミコンダクター株式会社 | Wireless communication apparatus and wireless communication method |
JP2012222761A (en) | 2011-04-14 | 2012-11-12 | Fujitsu Semiconductor Ltd | Radio communication equipment and radio communication method |
US20140031078A1 (en) | 2012-07-27 | 2014-01-30 | Brother Kogyo Kabushiki Kaisha | Communication Device |
JP2014027538A (en) | 2012-07-27 | 2014-02-06 | Brother Ind Ltd | Communication device |
WO2016136648A1 (en) | 2015-02-25 | 2016-09-01 | 京セラ株式会社 | Network device |
US20180034814A1 (en) | 2015-02-25 | 2018-02-01 | Kyocera Corporation | Network apparatus |
US20180332471A1 (en) * | 2016-05-05 | 2018-11-15 | Tencent Technology (Shenzhen) Company Limited | Wireless network connection method, wireless access point, server, and system |
US20180249517A1 (en) * | 2017-02-27 | 2018-08-30 | Samsung Electronics Co., Ltd | Method and apparatus for managing wireless router and device connected thereto |
Non-Patent Citations (3)
Title |
---|
International Search Report for PCT Application No. PCT/JP2018/007302, dated May 22, 2018. |
Japanese Office Action for JP Application No. 2020-503133 dated Aug. 17, 2021 with English Translation. |
Japanese Office Communication for JP Application No. 2020-503133 dated Feb. 15, 2022 with English Translation. |
Also Published As
Publication number | Publication date |
---|---|
JPWO2019167132A1 (en) | 2021-01-07 |
US20200389794A1 (en) | 2020-12-10 |
JP7127885B2 (en) | 2022-08-30 |
WO2019167132A1 (en) | 2019-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Internet of things security-multilayered method for end to end data communications over cellular networks | |
US10691788B2 (en) | Systems and methods for provisioning a camera with a dynamic QR code and a BLE connection | |
US20150271194A1 (en) | Fake Base Station Detection with Core Network Support | |
US9674219B2 (en) | Authenticating public land mobile networks to mobile stations | |
CN101621800B (en) | Method for exchanging authentication information between wireless terminal and wireless router | |
CN109618344B (en) | Safe connection method and device of wireless monitoring equipment | |
US20130007848A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
CN107529160B (en) | VoWiFi network access method and system, terminal and wireless access point equipment | |
EP2779723B1 (en) | Method and related device for accessing access point | |
JP2007531398A (en) | Wireless LAN intrusion detection method based on protocol anomaly analysis | |
US9009792B1 (en) | Method and apparatus for automatically configuring a secure wireless connection | |
US9439131B2 (en) | Detecting and disabling rogue access points in a network | |
CN104580152A (en) | Protection method and system against wifi (wireless fidelity) phishing | |
KR20170062301A (en) | Method and apparatus for preventing connection in wireless intrusion prevention system | |
CN105451230A (en) | Internet-of-things device configuration method and Internet-of-things device configuration system | |
US20140282905A1 (en) | System and method for the automated containment of an unauthorized access point in a computing network | |
CN103327484A (en) | Method for clearing illegal AP in wireless local area network | |
US20150082429A1 (en) | Protecting wireless network from rogue access points | |
US20170134416A1 (en) | Security techniques on inter-terminal communications within the same ssid under the same ap using openflow | |
US11496901B2 (en) | Radio communication apparatus, wireless LAN router, unauthorized access prevention method, and radio communication system | |
US20070109982A1 (en) | Method and system for managing ad-hoc connections in a wireless network | |
US20160164889A1 (en) | Rogue access point detection | |
Huang et al. | A whole-process WiFi security perception software system | |
Kaplanis | Detection and prevention of man in the middle attacks in Wi-Fi technology | |
US8122243B1 (en) | Shielding in wireless networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NEC PLATFORMS LTD.,, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NISHIKAWA, HIROSHI;REEL/FRAME:053551/0622 Effective date: 20200707 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |